|
|
Related Products
-
Golioth
Connect and secure devices, send sensor data to the web, update firmware over the air, and scale your fleet with our instant IoT cloud.
Select hardware and connectivity that meets your needs from your preferred vendor.
Use the open source Golioth Device SDK to integrate with your firmware securely. Once connected you can instantly monitor, manage, and update your devices from the Golioth console.
We’re a group of industry-leading hardware, firmware, and cloud engineers. We understand the struggle to connect “sand” to the internet, so we built a better way to do just that. We’re built for the embedded developer workflow. Use the tools you’re already familiar with to build robust and reliable devices, faster.
Choose from hundreds of hardware options and a variety of connectivity types, protocols, and multiple embedded RTOS providers.
Golioth provides a single control plane for all your devices, whether you’re exploring an idea, or improving an existing project.
-
Raima Database Manager (RDM)
Raima Database Manager is an embedded time series database for IoT and Edge devices that can run in-memory. It is an extremely powerful, lightweight and secure RDBMS . Field tested by over 20 000 developers worldwide and has more than 25 000 000 deployments.
-
Epicor Connected Process Control
Epicor Connected Process Control (CPC), formerly eFlex Systems, provides manufacturers a flexible, no-code/low-code MES solution. No programming or special skills required. Digital work instructions, with multi-media capabilities, along with the ability to integrate virtually any device with communication capabilities, provides 100% historical record of the product and the process. Providing data insight, from production reports, to part history, quality summary and more — address issues quickly, minimize waste and disruptions. Whether you start small in subassembly areas, an entire line, or apply enterprise wide - we work with manufacturers of all sizes and needs. Hosted on prem or in the cloud, you decide what's best for your operations.
-
Twilio
Design and deploy your ideal customer engagement experience. Twilio is a single fully-programmable platform with flexible APIs for any channel and over 400+ integrations, backed by a community of over 9 million developers. Build accurate and personalized experiences for your customers, easily and at scale, using SMS and WhatsApp messaging, voice, video, email, and more.
Browse documentation and SDKs in multiple coding languages, including Ruby, Python, PHP, Node.js, java, and C#, or jumpstart your first project with our open source code templates to quickly build production-ready communications apps. Sign up and start building today.
-
UTunnel VPN and ZTNA
UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity.
ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly.
ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application.
MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks.
SITE-TO-SITE VPN: The Access Gateway solution lets you easily set up secure Site-to-Site tunnels (IPSec) between UTunnel's VPN servers and hardware network gateways, firewalls & UTM systems.
-
IPVanish
IPVanish VPN protects your personal data in the heat of privacy threats with one touch. Keep your connection safe over hotspots and unsecured networks today. Whether you need a Wi-Fi hotspot shield, or safe file access, we have a solution for you. IPVanish VPN and storage tools simplify online security for the whole home with setups for desktop, mobile, consoles, and routers. Shield your internet activity with VPN privacy, or pair VPN + storage for complete online protection. It takes more than a private internet browser to go incognito. Keep your internet activity private with our anonymous IP addresses, and we’ll help keep network hackers, ISPs, and advertisers out of your connection. Secure your Wi-Fi connection and armor your location data with VPN. The best data defense pairs security with convenience. Safeguard access to your most important files with encrypted backup, automated syncing, and remote wiping controls.
-
Pikmykid
Pikmykid is the leading safety and dismissal platform that empowers schools to simplify dismissal, engage parents, and keep students safe without the need to purchase, install, or support additional hardware. Designed by former educators and parents, Pikmykid has helped more than 2,000 schools in all 50 states eliminate the busy work and vulnerabilities of dismissal so that teachers have more time to teach, admins aren’t bogged down in carpool calls, and principals can account for every student at the end of the day. And with extensive SIS integrations, Pikmykid easily fits into your schools’ existing ecosystems to make the tools you already have that much more powerful.
-
Cisco Duo
Protect your workforce with simple, powerful access security. We're Cisco Duo. Our modern access security is designed to safeguard all users, devices, and applications — so you can stay focused on what you do best. Secure access for any user and device, to any environment, from anywhere. Get the peace-of-mind only complete device visibility and trust can bring. Respond faster to threats with an easy‑to‑deploy, scalable SaaS solution that natively protects every application. Duo's access security shields any and every application from compromised credentials and devices, and its comprehensive coverage helps you meet compliance requirements with ease. Duo natively integrates with applications to provide flexible, user-friendly security that's quick to roll out and easy to manage. It's a win, win, win for users, administrators, and IT teams alike. Lay the foundation for your zero-trust journey with multi-factor authentication, dynamic device trust, adaptive authentication and secure SSO.
-
Auth0
Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™.
Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control.
Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
-
Cloudflare
Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and more shift online, ensuring these resources are secure, performant and reliable is a business imperative. Cloudflare for Infrastructure is a complete solution to enable this for anything connected to the Internet. Behind-the-firewall applications and devices are foundational to the work of your internal teams. The recent surge in remote work is testing the limits of many organizations’ VPN and other hardware solutions.
|
|